Abstract
In this chapter, various process models along with their various phases in the field of digital forensics and network forensics are discussed. The discussion in the field of processing digital forensics and network forensics is also given. Models based on hierarchy are discussed. The process models in the field of network forensics are given more emphasis in discussion. A generic process model for network forensics is given with detailed discussion.
References
Palmer G (2001) A road map for digital forensic research. Utica, New York
Carrier B, Spafford EH (2003) Getting physical with the digital investigation process. Int J Digit Evid 2(2):1–20
Baryamureeba V, Tushabe F (2004) The enhanced digital investigation process model. In: Fourth Digital Forensic Research workshop, pp 1–9
Casey E, Palmer G (2004) The investigative process. In: Digital evidence and computer crime. Elsevier Academic Press, London
Ieong RSC (2006) FORZA-Digital forensics investigation framework that incorporate legal issues. Digit Investig 3:29–36
Selamat SR, Yusof R, Sahib S (2008) Mapping process of digital forensic investigation framework. Int J Comput Sci Netw Secur 8(10):163–169
Grobler CP, Louwrens CP, von Solms SH (2010) A multi-component view of digital forensics. In: ARES’10 international conference on availability, reliability, and security, pp 647–652
Ademu IO, Imafidon CO, Preston DS (2011) A new approach of digital forensic model for digital forensic investigation. Int J Adv Comput Sci Appl 2(12):175–178
Agarwal A, Gupta M, Gupta S, Gupta SC (2011) Systematic digital forensic investigation model. Int J Comput Sci Secur (IJCSS) 5(1):118–131
James JI, Gladyshev P (2013) A survey of digital forensic investigator decision processes and measurement of decisions based on enhanced preview. Digit Investig 10(2):148–157
Shrivastava AK, Payal N, Rastogi A, Tiwari A (2013) Digital forensic investigation development model. In: 5th international conference on Computational Intelligence and Communication Networks (CICN), pp 532–535
Kohn MD, Eloff MM, Eloff JHP (2013) Integrated digital forensic process model. Comput Secur 38(1):103–115
Beebe NL, Clark JG (2005) A hierarchical, objectives-based framework for the digital investigations process. Digit Investig 2(2):147–167
Ciardhuain SO (2004) An extended model of cybercrime investigations. Int J Digit Evid 3(1):1–22
Merkle LD (2008) Automated network forensics. In: Genetic and Evolutionary Computation Conference (GECCO 08), Atlanta, Georgia, USA, pp 1929–1932
Liang H, Kuo T, Guangkun S, Nurbol, Kuo Z (2009) DDCFS: a distributed dynamic computer forensic system based on network. In: Second international conference on intelligent computation technology and automation, pp 53–56
Shin YD (2008) New digital forensics investigation procedure model. In: 2008 fourth international conference on networked computing and advanced information management, pp 528–531
Hou M, Shen L (2009) A new system design of network invasion forensics. In: Second International Conference on Computer and Electrical Engineering (ICCEE), Dubai, pp 596–599
Strauss T, Olivier MS (2011) Network forensics in a clean-slate Internet architecture. In: Information Security South Africa (ISSA), pp 1–5
Zainudin NM, Merabti M, Llewellyn-Jones D (2011) Online social networks as supporting evidence: a digital forensic investigation model and its application design. In: International Conference on Research and Innovation in Information Systems (ICRIIS), Kuala Lumpur, Malaysia, pp 1–6
Jiang L, Tian G, Zhu S (2012) Design and implementation of network forensic system based on intrusion detection analysis. In: International conference on Control Engineering and Communication Technology, pp 689–692
Chen LM, Chen MC, Liao W, Sun YS (2013) A scalable network forensics mechanism for stealthy self-propagating attacks. Comput Commun 36(13):1471–1484
Rossy Q, Ribaux O (2014) A collaborative approach for incorporating forensic case data into crime investigation using criminal intelligence analysis and visualisation. Sci Justice 54(2):146–153
Pilli ES, Joshi RC, Niyogi R (2010) Network forensic frameworks: survey and research challenges. Digit Investig 7(1–2):14–27
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer-Verlag London
About this chapter
Cite this chapter
Joshi, R.C., Pilli, E.S. (2016). Network Forensic Process Models. In: Fundamentals of Network Forensics. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-7299-4_2
Download citation
DOI: https://doi.org/10.1007/978-1-4471-7299-4_2
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-7297-0
Online ISBN: 978-1-4471-7299-4
eBook Packages: Computer ScienceComputer Science (R0)